TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download

A credit card or PayPal account is required to activate your subscription. You will be billed $299.00/year and you will receive a receipt via email once your payment is processed. You may cancel your subscription with at least 10 business days notice prior to the expiration of your current subscription by accessing the Premium tab in your TechRepublic Profile and selecting “Cancel Subscription.” TechRepublic Premium is the fastest, smartest way to solve the toughest IT problems. Subscribe to access our full library of resources and gain benefits from: Quick access to expert analysis from IT leaders, original research and surveys, comprehensive guides on hot topics, and eBooks from TechRepublic. Ready-to-go policies and initiatives, downloadable templates and forms you can customize, and hundreds of time-saving tools, calculators and kits. source

TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download Read More »

Direct Inward Dialing Guarantees Callers Reach You Faster

Direct Inward Dialing (DID) is a way to reach a specific team member or department in an organization by dialing them directly, rather than going through a main phone menu or operator. It’s a feature commonly used within Private Branch Exchange (PBX) systems, and many Voice over Internet Protocol (VoIP) providers support DID functionality in their solutions. With DID, callers enjoy a more personalized, streamlined experience, and companies can support a more efficient, effective workforce. 1 RingCentral Office Employees per Company Size Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+) Medium (250-999 Employees), Enterprise (5,000+ Employees), Large (1,000-4,999 Employees) Medium, Enterprise, Large Features Hosted PBX, Managed PBX, Remote User Ability, and more Why direct inward dialing is so useful A DID number is a virtual phone number that lets businesses give each employee or department a direct line, without needing a separate phone line for each person. Normally, a company would have just a few main phone lines, called “trunk lines,” but with DID, they can connect multiple unique numbers to those same lines. This means a customer calling a specific DID number can reach a person or department directly, instead of going through a central receptionist or switchboard. Companies can use DID numbers to: Improve customer service, quickly connecting callers with their intended contact and limiting missed calls. Deploy local or toll-free numbers across different markets, projecting a professional presence wherever their customers are. Scale the number of phone extensions quickly, without adding physical infrastructure. Support a more personalized call experience, without the hassle of wading through lengthy phone menus. Maintain employee privacy, as calls can be forwarded to a personal cell phone when out of the office or working remotely. Bolster a business continuity strategy, allowing calls to be redirected to backup locations or remote employees during outages or emergencies. VoIP services make Direct Inward Dialing easy to configure Today, many companies make phone calls using VoIP instead of a landline. Essentially, they have a cloud phone system that uses the internet rather than a hardware PBX that uses the Public Switched Telephone Network (PSTN). Using DID numbers with VoIP is much easier than using a traditional system. Instead of installing a lot of hardware, companies can simply log into their VoIP phone software and add or change DID numbers online. This lets businesses set up direct lines for employees or departments fast, without big setup costs or waiting for vendors. VoIP also gives businesses lots of ways to customize call routing. For example, companies can decide where calls go based on the time of day, who’s available, or where employees are working. This is especially helpful for remote or hybrid teams, as calls can be forwarded to different devices like cell phones or laptops with ease. With VoIP, companies have total control over their DID settings, and it’s all managed online, so changes are instant. VoIP services, especially call center software, include tools that track and analyze call data, like how many calls come in, how quickly they’re answered, and more. This info can help companies improve call flow and make better decisions about staffing and customer service. Overall, VoIP makes it easy to manage DID numbers and helps businesses stay flexible as they grow. How Direct Inward Dialing works When a caller enters a DID number on the traditional PSTN, the call routes through an organization’s main phone provider to the dedicated PBX system trunk line associated with that DID. If the line is available, the call then routes directly to the recipient. Otherwise, depending on the phone system configuration, the caller might experience a busy signal or be routed to another destination, such as a holding queue or voice mailbox. VoIP providers manage the same direct routing much more efficiently through a process called Session Initiation Protocol (SIP) Trunking. Rather than renting a set number of trunk lines, which can then be updated only by the phone company, a VoIP provider can save businesses a great deal of time and money by establishing trunk lines as needed. Organizations can configure their system however they wish and reconfigure it at any time through their VoIP software interface. This is a huge benefit over traditional PSTN systems. Can you fax with a DID number? Yes. The process works in the same way as a traditional fax line. A DID number can be connected directly to a fax machine or to a fax server that runs to several machines. This way, each team member may be assigned their own DID phone number and separate DID fax number, which connects to a dedicated machine near their workspace. SEE: Learn why you shouldn’t use your own fax server and what to use instead.  With the rise of remote work, modern businesses often connect a DID number to a cloud fax solution capable of converting documents into a JPG, PDF, or similar file that can be routed to an employee’s laptop or cell phone. DID numbers vs DOD numbers Somewhat related to Direct Inward Dialing, Direct Outward Dialing (DOD) enables team members to call anyone outside of their PBX system directly using the standard phone number format without having to go through an operator or switchboard. For convenience, a system can even be configured to dial outside numbers in a localized area without needing to use the area code. Anytime an employee calls an outside party from a DOD number, that specific individual or departmental extension will display on the recipient’s caller ID rather than a generalized main company phone number. This is simply one more way that companies can strengthen their brand by providing a more personalized, streamlined experience for customers, vendors, and other associates. source

Direct Inward Dialing Guarantees Callers Reach You Faster Read More »

2024 Halloween Frights in Tech

This slideshow isn’t about kid’s stuff like how many companies are STILL using Microsoft Word macro-enabled templates like it’s a thrice-shouted Beetlejuice dare. Oh no, these are the hardcore terrors that really happened in 2024, many of which are still scaring the bejesus out of people now. And probably will continue into 2025, too. Some scary stuff is as sticky as melted Halloween chocolates.  Read on if you dare. Then lock the doors and pay your software developers and cybersecurity people more!   source

2024 Halloween Frights in Tech Read More »

Software Makers Encouraged to Stop Using C/C++ by 2026

The federal government is encouraging software manufacturers to ditch C/C++ and take other actions that could “reduce customer risk,” according to the Product Security Best Practices report. In particular, CISA and the FBI set a deadline of Jan. 1, 2026, for compliance with memory safety guidelines. The report covers guidelines and recommendations rather than mandatory rules, particularly for software manufacturers who work on critical infrastructure or national critical functions. The agencies specifically highlighted on-premises software, cloud services, and software-as-a-service. While it isn’t directly stated that using ‘unsafe’ languages could disqualify manufacturers from government work, and the report is “non-binding,” the message is straightforward: Such practices are inappropriate for any work classified as relevant to national security. “By following the recommendations in this guidance, manufacturers will signal to customers that they are taking ownership of customer security outcomes, a key Secure by Design principle,” the report states. Memory-unsafe programming languages introduce potential flaws The report describes memory-unsafe languages as “dangerous and significantly elevates risk to national security.” Development in memory-unsafe languages is the first practice the report mentions. Memory safety has been a topic of discussion since at least 2019. Languages like C and C++ “provide a lot of freedom and flexibility in memory management while relying heavily on the programmer to perform the needed checks on memory references.” a 2023 NSA report on memory safety stated. However, the report continued, those languages lack inherent memory protections that would prevent memory management issues. Threat actors can exploit memory issues that might arise in those languages. Must-read developer coverage What software manufacturers should do by January 2026 By Jan. 1, 2026, manufacturers should have: A memory safety roadmap for existing products written in memory-unsafe languages, which “should outline the manufacturer’s prioritized approach to eliminating memory safety vulnerabilities in priority code components.” A demonstration of how the memory-safety roadmap will reduce memory-safety vulnerabilities. A demonstration of “reasonable effort” in following the roadmap. Alternatively, manufacturers should use a memory-safe language. Memory-safe languages approved by the NSA include: Python. Java. C#. Go. Delphi/Object Pascal. Swift. Ruby. Rust. Ada. SEE: Benefits, risks, and best practices of password managers (TechRepublic) Other ‘bad practices’ vary from poor passwords to lack of disclosures Other practices labeled “exceptionally risky” by CISA and the FBI include: Allowing user-provided input directly in the raw contents of a SQL database query string. Allowing user-provided input directly in the raw contents of an operating system command string. Using default passwords. Instead, manufacturers should ensure their product provides “random, instance-unique initial passwords,” requires the users to create new passwords at the start of the installation process, requires physical access for initial setup, and transitions existing deployments away from default passwords. Releasing a product containing a vulnerability from CISA’s Known Exploited Vulnerabilities (KEV) Catalog. Using open source software with known exploitable vulnerabilities. Failing to leverage multifactor authentication. Lacking the capability to gather evidence of intrusion if an attack does occur. Failing to publish timely CVEs including the Common Weakness Enumeration (CWE), which indicates the type of weakness underlying the CVE. Failing to publish a vulnerability disclosure policy. The full report includes recommended next steps organizations can use to comply with the agencies’ guidelines. source

Software Makers Encouraged to Stop Using C/C++ by 2026 Read More »

Microsoft’s new Magnetic-One system directs multiple AI agents to complete user tasks

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Enterprises looking to deploy multiple AI agents often need to implement a framework to manage them.  To this end, Microsoft researchers recently unveiled a new multi-agent infrastructure called Magnetic-One that allows a single AI model to power various helper agents that work together to complete complex, multi-step tasks in different scenarios. Microsoft calls Magnetic-One a generalist agentic system that can “fully realize the long-held vision of agentic systems that can enhance our productivity and transform our lives.” The framework is open-source and available to researchers and developers, including for commercial purposes, under a custom Microsoft License. In conjunction with the release of Magnetic-One, Microsoft also released an open-source agent evaluation tool called AutoGenBench to test agentic systems, built atop its previously released Autogen framework for multi-agent communication and cooperation. The idea behind generalist agentic systems is to figure out how autonomous agents can solve tasks that require several steps to finish that are often found in the day to day running of an organization or even an individual’s daily life.  From the examples Microsoft provided, it looks like the company hopes Magnetic-One fulfills almost mundane tasks. Researchers pointed Magnetic-One to tasks like describing trends in the S&P 500, finding and exporting missing citations, and even ordering a shawarma.  How Magnetic-One works Magnetic-One relies on an Orchestrator agent that directs four other agents. The Orchestrator not only manages the agents, directing them to do specific tasks, but also redirects them if there are errors. The framework is composed of four types of agents other than the Orchestrator: Websurfer agents can command Chromium-based web browsers and navigate to websites or perform web searches. It can also click and type, similar to Anthropic’s recently released Computer Use, and summarize content.  FIleSurfer agents read local files list directories and go through folders. Coder agents write codes, analyze information from other agents and create new artifacts. ComputerTerminal provides a console where the Coder agent’s programs can be executed.  The Orchestrator directs these agents and tracks their progress. It starts by planning how to tackle the task. It creates what Microsoft researchers call a task ledger that tracks the workflow. As the task continues, the Orchestrator builds a progress ledger “where it self-reflects on task progress and checks whether the task is completed.” The Orchestrator can assign an agent to complete each task or update the task ledger. The Orchestrator can create a new plan if the agents remain stuck.  “Together, Magentic-One’s agents provide the Orchestrator with the tools and capabilities that it needs to solve a broad variety of open-ended problems, as well as the ability to autonomously adapt to, and act in, dynamic and ever-changing web and file-system environments,” the researchers wrote in the paper.  While Microsoft developed Magnetic-One using OpenAI’s GPT-4o — OpenAI is after, all a Microsoft investment — it is LLM-agnostic, though the researchers “recommend a strong reasoning model for the Orchestrator agent such as GPT-4o.”  Magnetic-One supports multiple models behind the agents, for example, developers can deploy a reasoning LLM for the Orchestrator agent and a mix of other LLMs or small language models to the different agents. Microsoft’s researchers experimented with a different Magnetic-One configuration “using OpenAI 01-preview for the outer loop of the Orchestrator and for the Coder, while other agents continue to use GPT-4o.” The next step in agentic frameworks Agentic systems are becoming more popular as more options to deploy agents, from off-the-shelf libraries of agents to customizable organization-specific agents, have arisen. Microsoft announced its own set of AI agents for the Dynamics 365 platform in October.  Tech companies are now beginning to compete on AI orchestration frameworks, particularly systems that manage agentic workflows. OpenAI released its Swarm framework, which gives developers a simple yet flexible way to allow agents to guide agentic collaboration. CrewAI’s multi-agent builder also offers a way to manage agents. Meanwhile, most enterprises have relied on LangChain to help build agentic frameworks.  However, AI agent deployment in the enterprise is still in its early stages, so figuring out the best multi-agent framework will continue to be an ongoing experiment. Most AI agents still play in their playground instead of talking to agents from other systems. As more enterprises begin using AI agents, managing that sprawl and ensuring AI agents seamlessly hand off work to each other to complete tasks is more crucial.  source

Microsoft’s new Magnetic-One system directs multiple AI agents to complete user tasks Read More »

How to Become a Chief Information Officer: CIO Cheat Sheet

Business leaders are responsible for guiding a company and its employees toward successful goals. To accomplish this, leaders must hire the best candidates to support their staff. But the responsibilities don’t stop there. Most big changes in organizations begin at the top: diversity and inclusion efforts, innovation initiatives, mentorship programs, upskill and reskill prioritization, cybersecurity procedures, and overall goal assessment. These movements are typically set by those in the C-suite and implemented by other executives and managers. SEE: How to build a successful CIO career (free PDF) (TechRepublic) However, planning and implementing the technology strategy for an organization falls on one specific leader: the chief information officer (CIO). The CIO is the executive-level face of the technology department for the business, requiring an individual with impressive technical knowledge and communication abilities. Other members of the C-suite include the chief executive officer, chief digital officer, and the chief technology officer — and are generally referred to as CXOs. CIOs are sometimes mistaken for CTOs, but CTOs are more responsible for forming technologies or technology strategies that help grow the business externally, looking at customer needs. CIOs, instead, are inward-facing, managing the internal IT infrastructure. This cheat sheet is available as a download, How to become a CIO: A cheat sheet (free PDF). What does a CIO do? The main responsibilities of the CIO are to work with other members of the C-suite and technology department to create the best technology gameplan for the business. Indeed’s Learning About Being a CIO career guide outlined the following common tasks of a CIO: Analyze the technology used in the design, development, and administration of the company for accuracy and efficiency. Collaborate with the CEO and project managers to assess resource use and allocation. Overlook the progress and development of the company’s communications network. Design a sufficient wide-area connectivity infrastructure that can support remote access. Compile a cost-benefit analysis of every change in the IT workflow. Suggest software and hardware upgrades as needed that improve operations and fit budget constraints. The rise of technologies including artificial intelligence, Internet of Things, cloud computing, and big data analytics brings new challenges and responsibilities for CIOs, according to a post on The Balance Careers. Service analysis, data security, and market reach are now part of a CIO’s work. They must also ensure the organization complies with GDPR. SEE: All of TechRepublic’s cheat sheets (TechRepublic) Why are CIOs important for organizations? As tech continues evolving, successful workplaces are forced to follow suit. However, employees — and the organization as a whole — can’t upskill if they don’t know what the most useful tech trends are, which is where CIOs enter. Not only is implementing innovative technologies crucial for business success, they are also crucial for business relevancy. The CIO’s purpose is to make sure the organization is investing in the best tech. Without a CIO, organizations can fall behind on tech trends and be rendered irrelevant. Must-read CXO coverage What is the difference between a CIO and an IT director? CIOs handle broader strategy and communications with other members of leadership, while IT directors are more responsible for the oversight of day-to-day operations. The main tasks given to IT directors include communicating with vendors, supervising the operation of server systems, supporting the implementation of software and hardware upgrades, and identifying security vulnerabilities, according to Indeed’s IT Director career guide. SEE: 10 ways to prevent developer burnout (TechRepublic) The career guide clarified that most IT directors at medium- to large-sized businesses usually report to a C-level executive. This means they are the ones implementing the software and hardware upgrades decided upon by the CIO, as well as communicating known security vulnerabilities so the CIO can determine the next steps within the organization. What are some paths to becoming a CIO? The career path to becoming a CIO is not set or linear. Most often, it is a long and winding road to the top. Common education requirements for becoming a CIO include a bachelor’s degree in computer science, software engineering, information systems, or a related field, and often a master’s degree in business administration or information technology. Otherwise, qualifications mostly come down to experience. A good estimate might be that organizations want a minimum of eight years of experience in information technology and resource management, with a preference for candidates with at least three years on an executive level. An individual may need 15 years of experience in tech and business before making the leap. While no clear path exists to becoming CIO, the more experience one has, the better. Additional resources What is the average salary for a CIO? As one of the highest-paying cybersecurity jobs, CIOs do make an impressive salary. Based on 724 salaries reported on Indeed — last updated on Oct. 28, 2024 — the average pay per year for a CIO in the U.S. is $131,501. Payscale found that experience can make a big difference in a CIO’s pay. An entry-level CIO in the U.S. with less than one year of experience will typically earn an average of $113,003. However, that number jumps to $191,522 for CIOs with at least 20 years of experience. What are the hottest markets for CIOs? The 10 U.S. states with the highest average annual salaries for CIOs, according to ZipRecruiter, are as follows (as of October 2024): Washington ($193,665). New York ($172,811). Vermont ($169,548). California ($165,136). Maine ($160,603). Massachusetts ($158,812). Idaho ($158,471)8. Pennsylvania ($158,280). Texas ($157,859). Alaska ($157,605). Overall, the market for CIOs is very positive. According to the Bureau of Labor Statistics, employment in this field is projected to grow by 17% by 2033, faster than the total employment growth of 4% across occupations in the U.S. What are typical CIO interview questions? Some of the top questions potential CIOs could face during a job interview, according to Indeed, include: “This company might need to purchase and implement a new IT system at some point. As a CIO, how would you convince [other executives] the system is

How to Become a Chief Information Officer: CIO Cheat Sheet Read More »